In this BSD Now episode, hosts Kris Moore and Allan Jude interview Ed Schouten regarding CloudABI, a new application binary interface which focuses on isolation and restricted capabilities. Click play below to tune in:

vBSDcon, hosted by Verisign, has been announced and is being held on September 11-13 in Reston, Virginia.

Following the success of the inaugural vBSDcon, Verisign has elected to host a
second vBSDcon in Reston, Va at the Sheraton Reston hotel the weekend of
September 11, 2015. vBSDcon is a technical conference focused on the BSD
family of operating systems including, but not limited to, FreeBSD, OpenBSD,
NetBSD, and others. Any user, developer, engineer, or innovator involved with
any of the BSD family of operating systems will want to mark these dates.
vBSDcon will feature plenary talks, Birds of a Feather discussions, lightning
talks, and much more. Full details are available at http://www.vBSDcon.com/.
Additionally, While vBSDcon currently does not operate an “official” call for
presentations, proposals will be accepted until June. Anyone wishing to submit
a talk is invited to do so by emailing vbsd…@verisign.com. The event agenda
is expected to be finalized and published in mid-June.

@A: Daniel Morante

There comes a time when your FreeBSD root partition is just too small to be of any use. You’ve already moved /var, /usr, and /tmp to separate disks and there just isn’t anything else you can delete. The problem being that you initially created the partition to be too small when FreeBSD was first setup.

There are some guides out there that suggest to backup and start over. Others will tell you to use a dump and restore method. All that is too complicated and too much work for us lazy system administrators. Fortunately with recent versions of FreeBSD (9.0 and above) there is a handy little tool called “gpart”.

Requirements

FreeBSD 9.0 or later (if you have a lesser version, you might be able to get away with using a 9.x live CD)

FreeBSD 9.x or later boot-only media. (ISO or flash image)

Extra or unused space on the drive where the root partition is stored.

A backup of your most precious files stored on this system

This guide assumes you are using a single non-RAID IDE/SATA or SCSI disk. Device names may be different and extra drivers may need to be loaded for other types of disks.

The developers of FreeBSD have posted their quarterly status report. Follow the link below to hear reports from FreeBSD Bugmeister, Ports Collection, and the FreeBSD Core Team.

This report covers FreeBSD-related projects between January and March 2015. This is the first of four reports planned for 2015.

The first quarter of 2015 was another productive quarter for the FreeBSD project and community. FreeBSD is being used in research projects, and those projects are making their way back into FreeBSD as new and exciting features, bringing improved network performance and security features to the system. Work continues to improve support for more architectures and architecture features, including progress towards the goal of making ARM (32- and 64-bit) a Tier 1 platform in FreeBSD 11. The toolchain is receiving updates, with new versions of clang/LLVM in place, migrations to ELF Tool Chain tools, and updates to the LLDB and gdb debuggers. Work by ports teams and kernel developers is maintaining and improving the state of FreeBSD as a desktop operating system. The pkg team is continuing to make binary packages easier to use and upgrade.

Thanks to all the reporters for the excellent work!

The deadline for submissions covering the period from April to June 2015 is July 7th, 2015.

Introduction

SSH is the most popular way to log in to a server remotely. It is a cryptographic protocol that protects your password against man-in-the-middle and replay attacks.

You must keep in mind, though, that SSH protects your data only while it is in transit. Attackers can discover your SSH password by other means, such as by using keyloggers or strategically placed cameras.

As long as you use a trusted computer (say, one that belongs to you or your company), and do so from a safe location, you don’t have to worry about such attacks. However, sometimes you might need to use a public computer. To protect your passwords in such scenarios, FreeBSD comes with a security feature called One-time Passwords In Everything, or OPIE.

In this tutorial, you will learn how to generate and use one-time passwords to log in to your remote FreeBSD server. You can pregenerate one or more one-time passwords when you’re in a safe location, and save them for later when you access your server from a less secure location. That way, even if your one-time password gets logged, it won’t ever be useful to an attacker.

Prerequisites

In order to follow this tutorial, you will need:

A FreeBSD 10.1 server which is accessible over SSH

A user who is allowed to switch to root; the default freebsd user on DigitalOcean is fine

In this BSD Magazine issue, they present with us NodeJS and FreeBSD, Basecamp project management tool, a complete guide to understanding FreeNAS hardware, Google Earth Foresnics, and as always several articles by Rob Somerville.